Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hong Kong

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.164.81.0 - 103.164.81.255'

% Abuse contact for '103.164.81.0 - 103.164.81.255' is 'enquiry@scloud.sg'

inetnum:        103.164.81.0 - 103.164.81.255
netname:        SCLOUDPTELTD-SG
descr:          Scloud Pte Ltd t/a Scloud Pte Ltd
country:        SG
org:            ORG-SPL64-AP
admin-c:        SPLA52-AP
tech-c:         SPLA52-AP
abuse-c:        AS3102-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-SCLOUDPTELTD-SG
mnt-routes:     MAINT-SCLOUDPTELTD-SG
mnt-irt:        IRT-SCLOUDPTELTD-SG
last-modified:  2021-09-14T05:36:58Z
source:         APNIC

irt:            IRT-SCLOUDPTELTD-SG
address:        BLK71 Ayer Rajah Crescent
e-mail:         enquiry@scloud.sg
abuse-mailbox:  enquiry@scloud.sg
admin-c:        SPLA52-AP
tech-c:         SPLA52-AP
auth:           # Filtered
remarks:        enquiry@scloud.sg was validated on 2025-07-01
mnt-by:         MAINT-SCLOUDPTELTD-SG
last-modified:  2025-09-04T07:47:47Z
source:         APNIC

organisation:   ORG-SPL64-AP
org-name:       Scloud Pte Ltd
org-type:       LIR
country:        SG
address:        160 Robinson Rd, SBF Center, # 14-01
phone:          +65 65920936
fax-no:         +6562920937
e-mail:         enquiry@scloud.sg
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:18:26Z
source:         APNIC

role:           ABUSE SCLOUDPTELTDSG
country:        ZZ
address:        BLK71 Ayer Rajah Crescent # 05-24/25/26
phone:          +000000000
e-mail:         enquiry@scloud.sg
admin-c:        SPLA52-AP
tech-c:         SPLA52-AP
nic-hdl:        AS3102-AP
remarks:        Generated from irt object IRT-SCLOUDPTELTD-SG
remarks:        enquiry@scloud.sg was validated on 2025-07-01
abuse-mailbox:  enquiry@scloud.sg
mnt-by:         APNIC-ABUSE
last-modified:  2025-07-01T11:09:07Z
source:         APNIC

role:           Scloud Pte Ltd administrator
address:        160 Robinson Rd, SBF Center, #14-01, Singapore Singapore 068914
country:        SG
phone:          +65-65920936
e-mail:         tech@scloud.sg
admin-c:        SPLA52-AP
tech-c:         SPLA52-AP
nic-hdl:        SPLA52-AP
notify:         tech@scloud.sg
mnt-by:         MAINT-SCLOUDPTELTD-SG
last-modified:  2021-09-14T05:36:49Z
source:         APNIC

% Information related to '103.164.81.0/24AS142002'

route:          103.164.81.0/24
origin:         AS142002
descr:          Scloud Pte Ltd
                160 Robinson Rd, SBF Center, #14-01
mnt-by:         MAINT-SCLOUDPTELTD-SG
last-modified:  2021-03-31T05:27:05Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.164.81.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.164.81.118.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110300 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 03 20:01:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 118.81.164.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 103.164.81.118.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
211.144.12.75 attackspambots
Nov 16 17:49:46 MK-Soft-Root1 sshd[15393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.144.12.75 
Nov 16 17:49:48 MK-Soft-Root1 sshd[15393]: Failed password for invalid user haj from 211.144.12.75 port 28370 ssh2
...
2019-11-17 00:56:04
62.234.154.222 attack
Nov 16 17:54:55 MK-Soft-Root2 sshd[23809]: Failed password for root from 62.234.154.222 port 58413 ssh2
...
2019-11-17 01:11:56
201.150.109.105 attackspambots
scan z
2019-11-17 01:00:47
82.78.228.71 attackbotsspam
8080/tcp
[2019-11-16]1pkt
2019-11-17 01:12:11
45.229.154.100 attack
60001/tcp
[2019-11-16]1pkt
2019-11-17 00:52:47
92.119.160.40 attackbots
Nov 16 16:24:24 mc1 kernel: \[5204128.928038\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.40 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=51895 PROTO=TCP SPT=47504 DPT=1704 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 16 16:24:56 mc1 kernel: \[5204160.857742\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.40 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=9109 PROTO=TCP SPT=47504 DPT=304 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 16 16:31:06 mc1 kernel: \[5204531.458262\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.40 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54231 PROTO=TCP SPT=47504 DPT=1003 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-17 00:54:50
195.175.58.154 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2019-11-17 00:47:30
80.82.77.139 attackbotsspam
recursive dns scanner
2019-11-17 01:16:31
222.255.122.61 attackbotsspam
xmlrpc attack
2019-11-17 00:33:54
92.119.160.15 attack
Nov 16 15:51:05 h2177944 kernel: \[6791342.865065\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.15 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=26138 PROTO=TCP SPT=41493 DPT=222 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 16 15:51:09 h2177944 kernel: \[6791346.439201\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.15 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=40234 PROTO=TCP SPT=41493 DPT=333 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 16 15:51:37 h2177944 kernel: \[6791374.388464\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.15 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=46853 PROTO=TCP SPT=41493 DPT=4389 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 16 15:52:10 h2177944 kernel: \[6791408.016175\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.15 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=33923 PROTO=TCP SPT=41493 DPT=5555 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 16 15:52:16 h2177944 kernel: \[6791413.100303\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.15 DST=85.214.117.9 L
2019-11-17 00:41:28
61.12.38.162 attack
2019-11-16T09:41:07.0964311495-001 sshd\[61439\]: Failed password for invalid user loushine from 61.12.38.162 port 35326 ssh2
2019-11-16T10:45:57.5108501495-001 sshd\[63798\]: Invalid user scales from 61.12.38.162 port 45278
2019-11-16T10:45:57.5147161495-001 sshd\[63798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.38.162
2019-11-16T10:45:59.6721461495-001 sshd\[63798\]: Failed password for invalid user scales from 61.12.38.162 port 45278 ssh2
2019-11-16T10:50:31.4110871495-001 sshd\[63975\]: Invalid user jouliet from 61.12.38.162 port 52042
2019-11-16T10:50:31.4189531495-001 sshd\[63975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.38.162
...
2019-11-17 01:05:04
13.92.254.50 attackspambots
fire
2019-11-17 00:55:19
101.204.204.187 attackbots
23/tcp
[2019-11-16]1pkt
2019-11-17 01:10:51
191.241.165.213 attackspam
26/tcp
[2019-11-16]1pkt
2019-11-17 00:34:30
46.105.227.206 attack
Automatic report - Banned IP Access
2019-11-17 00:59:23

Recently Reported IPs

196.171.125.40 101.36.108.175 185.135.180.173 64.225.17.183
54.225.14.76 37.49.148.105 103.211.222.98 50.7.250.164
240e:40d:9f00:4b03:a142:90fb:50da:f95d 66.249.75.236 66.249.69.12 176.65.148.246
106.120.7.124 129.19.0.1 192.165.198.152 2003:d2:1f4a:5200:d5e1:6a61:fb4a:b189
96.32.221.33 111.27.5.234 60.13.138.138 180.153.236.95